If you cannot view this email please click here



Hacking Cloud Compliance Reviews

Voting is now open for the 2014 Computing Security Awards

Finalists have been determined for the 2014 Computing Security Awards and we now ask you to vote to decide the ultimate winners. Voting closes 30 September and the winners will be revealed at an evening awards and dinner ceremony on 9 October in London.
If you haven't cast your votes yet, please do so at: www.computingsecurityawards.co.uk.


Are you being properly served?

Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns

main headline

Feel the fear - and take to the clouds anyway!

Poorly controlled IAM processes can lead to an organisation being audited and company data found to be at risk of being misused

main headline

Bare essentials for cyber fightback

With the cost of cybercrime to the UK put at a staggering £27bn per annum, what is being done to protect UK businesses? And is it enough?

main headline
banner advert


In pursuit of radical change

Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational objectives

main headline


banner advert

Beyond Antivirus

Comodo's Melih Abdulhayoğlu explains his company's unique approach to sandboxing and the powerful protection this delivers

main headline

Malware: Coming Soon to Your Company?

As the malware threat evolves, businesses need to rethink their methods of protection. Dr Andrew Armstrong, chief security consultant for Perspective Risk, explains

Becoming an APT Spycatcher

Cybercrime has become somewhat 'old school' in its approach today, writes Andy Travers, VP EMEA at Fortinet. It's not always about brute force anymore

main headline

Case Study

Sparkling outcome!

Casa Vinicola Zonin is one of the most important private wine houses in Italy and one of the foremost in the world, distributing and selling wines and sparkling wines

main headline


The proactive approach

Hackers are now exploiting more entry points to inflict damage than ever before. What’s to be done? Cyber Security EXPO may offer some clues

main headline


Rise of the CyberVors

Hold Security has identified a Russian cyber gang now in possession of what it says is the largest cache of stolen data ever

Partnership to Deliver Critical Incident Response

Guidance Software is partnering with Thales to deliver a full range of endpoint security and incident response products and services to the UK market

main headline

175 million plus customer records compromised

SafeNet, a global leader in data protection solutions, has released the highlights from its SafeNet Breach Level Index (BLI) for the second quarter of 2014

main headline

European Central Bank hack - lessons to be learned

Cybercriminals often act within communities and this is a likely scenario with the recent attack on the European Central Bank - and threat intelligence needs to be shared

main headline

New app for safer interaction

Comodo has released a desktop application that enables users to safely interact with mission-critical applications on malware-infected devices

main headline

Enterprises at risk

Websense has unveiled new findings from the global Ponemon Institute survey, 'Roadblocks, Refresh, & Raising the Human Security IQ'


Cyberoam CR35iNG

Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio

main headline


Security Project of the Year 2013 - Public Sector

WINNER: Lancashire Healthcare and NW NHS/Check Point/Imerja/Polycom
Imerja's Video as a Service (VaaS) is based on leading technology from Polycom and delivered from a secure environment underpinned by Check Point technology, allowing doctors and clinicians to assess and treat patients remotely through a secure, high-definition video link

main headline

Security Project of the Year 2013 - Private Sector

MXSweep UK channel manager Sheelagh Hawkins notes: "Our winning the award for Security Project of the Year (Private Sector) was great news and recognises just how well the entire MXSweep team works with partners to guarantee the successful delivery of services to their end-user customers.”

main headline

White papers


Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the September 2014 Newsletter.

The global business and IT landscape has changed greatly over the last year, with a growing number of cybersecurity incidents and large-scale data breaches. According to nearly 80% of respondents to a new COBIT user survey, having effective IT governance in place has become more valuable than ever.

To simplify IT governance and help companies manage their valuable data, global IT association ISACA has now launched an online version of its COBIT 5 framework. COBIT online has been designed to make it easy to navigate to the specific portions of COBIT that an enterprise needs, and also offers new goals and RACI Planner tools that allow companies to readily customise COBIT for their needs.

According to COBIT users, the top five benefits their enterprise achieved by implementing COBIT 5 are:

• Integrated business and IT
• Improved risk management
• Identified gaps
• Improved visibility with board of directors
• Improved communication among siloed teams.

This is a timely release and, if it delivers against its promises, could help to keep data breaches at bay for those who embrace it.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622